Player FM - Internet Radio Done Right
Checked 12d ago
تمت الإضافة منذ قبل four أعوام
المحتوى المقدم من Many Worlds Productions. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Many Worlds Productions أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
How Hacks Happen
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 3009097
المحتوى المقدم من Many Worlds Productions. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Many Worlds Productions أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
69 حلقات
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 3009097
المحتوى المقدم من Many Worlds Productions. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Many Worlds Productions أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
69 حلقات
كل الحلقات
×H
How Hacks Happen

Hacks used to be impressive, utilizing bits and pieces of technology that made us sit up and pay attention. Nowadays, every scam, breach, or sketchy text message gets labelled a "hack" when it's really just lazy use of existing technology, or an outright scam. Let's take a closer look at how the meaning of “hack” has changed, from the complex brilliance of NotPetya in 2017, to today's flood of scams powered by stolen data and AI fakery. It’s the end of the Age of the Great Hack, and the rise of the Age of Many Scams. Resources: Healthcare Data Breach Statistics Being Infected by NotPetya: What Maersk learned NotPetya: A Columbia University Case Study Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Who owns your trash? It's probably not you. 23:44
23:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب23:44
In this episode of How Hacks Happen, we delve into the complexities surrounding trash possession and legalities. Besides the legal distinctions between lost, mislaid, and abandoned property, there are the risks posed by scammers who rifle through trash for personal information so they can steal your identity or call you up and pretend to be your bank. No trash is safe in this world we live in, so shred, burn, and sanitize your trash before throwing it out. Resources: Dumpster Diving for Documents: The Low-Tech Threat Fueling High-Stakes Identity Theft California v. Greenwood State v. Hempele Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 The Amanda Knox Case: How To Get Arrested for Being Weird 27:37
27:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:37
Can you tell if someone is guilty just by looking at them? Let's delve into the infamous case of Amanda Knox, the American exchange student who was wrongfully accused of murdering her roommate in 2007. We'll talk bad cell phone forensics, media sensationalism, and cultural biases, and how they can lead to dire consequences for those who are judged not by evidence, but by how they act differently than society expects them to. Resources Amanda Knox website Sentence of the Court of Assizes of Perugia in the Murder of Meredith Kercher Talking to Strangers: What We Should Know about the People We Don't Know Teacher Recorded Laughing During Apalachee School Shooting May Have Been the Bravest Person in the Room Video of teacher laughing during school shooting Central Park jogger case . Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Send Me a Text! I'd love to hear from you. 3:12
3:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب3:12
Send me a text! No matter who you are or where you are in the world, I'd love to hear from you. This is a call for feedback on what you like about How Hacks Happen, what you don't like, or if you just want to say Hi. Click the "Send us a text" link below, and you'll be sending a text message directly to me, Michele Bousquet. I can't wait to read what you have to say. If I get enough messages, I'll even do an episode just with your feedback. Resources Just my bad self for this one The "Send us a text" link is just below! . Send us a text Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Coinbase Hack and Impending Crypto Doom 27:06
27:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب27:06
In May 2025, Coinbase, one of the largest cryptocurrency exchanges in the world, got hacked. Or did they? It was more like a near-miss. But while we might wipe our brows in relief over this latest mishap, it doesn't bode well for the future of cryptocurrency, which is currently unregulated, uninsured, and just waiting for the next big catastrophe to leave investors crying in their collective beers over their lost millions. Join us for a tour of some of most disastrous crypto hacks of yesteryear like Mt Gox and Bybit, and what we see coming for the future of crypto. Hint: It's not pretty. Resources Coinbase: Protecting Our Customers - Standing Up to Extortionists The Story of Mt. Gox: Explained Bank Secrecy Act (BSA) What Is Crypto KYC and Why Do Exchanges Need It in 2025? The ByBit Heist and the Future of U.S. Crypto Regulation Top 10 Cryptos to Invest In May 2025 . Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Stingray Part II: The Fight for Privacy 23:56
23:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب23:56
In this episode we continue the story of Daniel Rigmaiden, a man arrested for tax fraud in 2008 who reveals the Stingray surveillance device used by the Feds to track his location. Despite being in jail, Rigmaiden tirelessly researches and files numerous motions, arguing that the use of Stingrays violated citizens' Fourth Amendment rights. His determination attracts the attention of the ACLU and the EFF, ultimately influencing government policy on surveillance practices, policies that protect privacy for all of us. Resources Rigmaiden court documents DOJ: Justice Department Announces Enhanced Policy for Use of Cell-Site Simulators The News Tribune: Stingray snared him, now he helps write rules for surveillance ACLU: Fighting for Transparency Wall Street Journal: Judge Questions Tools That Grab Cellphone Data on Innocent People ACLU website EFF website . Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Stingray Part I: Does Cell Phone Surveillance Violate Your Rights? 25:00
25:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب25:00
In 2014, the US government chose not to take a massive, rock-solid tax fraud case to trial. But why? This episode kicks off the tale of Daniel Rigmaiden, a hacker who exploited a legal loophole to regain his freedom. Find out how Rigmaiden's method for online connection, his Air Card, was both his downfall and his salvation. Take a deep dive into the data cell providers collect, how they share it with law enforcement, and the Fourth Amendment's role in protecting privacy. And tune in for Part II, where the real drama unfolds. 01:02 The Rise of a Hacker 03:04 The Air Card: A Game Changer 08:17 How Cell Providers Track You 10:46 The Fourth Amendment and Your Privacy 18:33 The Stingray: A Controversial Surveillance Tool Resources Fourth Amendment Primer United States of America v. Daniel David Rigmaiden, Government’s Response to Defendant’s Motion to Suppress Video: Daniel Rigmaiden at Aaron Swartz Day 2017 . Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Identity Theft: Three Stories | Replay 50:26
50:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب50:26
Is your identity at risk? And what would you do if someone was using it to take out credit cards, steal your tax refund, or even raid your bank account? Enjoy this replay of interviews with Tiffany, Pete, and Astrid, three victims of identity theft. Even though this episode originally aired in 2022, the same lessons remain. Listen to hear about how each of the three discovered the fraud, what they did to reverse the damage, and what they do now to prevent it from happening again. . Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Inspiring Tech Leaders - The Technology Podcast Interviews with Tech Leaders and insights on the latest emerging technology trends. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Social Media Smoke: Razzlekhan, Dutch, and the $4 Billion Heist 24:06
24:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب24:06
When over 100,000 Bitcoin went missing in 2016, no one suspected the culprits: a quiet, mild-mannered developer and his ostentatious entrepreneur/rapper wife with a wacky social media presence. Meet Razzlekhan and Dutch, the most unlikely thieves in the history of crime. Resources: Razzlekhan and husband guilty of $4.5bn Bitcoin launder Bitcoin Plunges After Hacking of Exchange in Hong Kong Bitfinex Hacker Sentenced in Money Laundering Conspiracy Involving Billions in Stolen Cryptocurrency . Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Social Media Smoke: Andrew Tate and The Real World 26:01
26:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب26:01
Why is Andrew Tate so popular with young men? With his sports cars and his obvious wealth, Tate has built a significant following out of his admittedly silly 'alpha male' rants. But behind the flashy lifestyle lies a web of controversy, including serious criminal charges. From promising young men financial independence and all the women they can handle, to the humiliations of a pro-trans hack and getting slapped down by a teenage girl on Twitter, the wild world of Andrew Tate is about as crazy as it gets. Resources The Guardian: Inside the violent, misogynistic world of TikTok’s new star, Andrew Tate Daily Dot: Hackers breach Andrew Tate’s online university—obtain chat logs and leak data on 800,000 users Pro-trans rights hackers target Andrew Tate’s The Real World website Andrew Tate’s University Hacked: Chat Logs and Leaked Data of 800,000 Users Forbes: Andrew Tate’s Online University Hacked—800,000 Users Exposed Rolling Stone Magazine: Greta Thunberg Doesn’t Care About Andrew Tate’s Cars — But Has an Idea of What They’re Overcompensating For Andrew Tate / Greta Thunberg Tweet War Part 1 Andrew Tate / Greta Thunberg Tweet War Part 2 BBC News: 'Boys formed Andrew Tate club in school' - teacher New York Times: ‘Brainwashing a Generation’: British Schools Combat Andrew Tate’s Views . Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Social Media Fraud: Hushpuppi and the Designer Lifestyle 23:58
23:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب23:58
Instagram star Hushpuppi had over 2 million followers. With his amazing lifestyle filled with Ferraris and Rolls Royces and private jets, dressed head-to-toe in Gucci and Versace and Fendi, Hushpuppi seemed to have it all. But Hushpuppi's lifestyle was built on a massive pile of fraud, $2 billion dollar's worth, that eventually landed him in prison. Resources Video: Dubai Police take down "Hushpuppi" , "Woodberry", ten international cyber criminals Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 April Fool's Day Exclusive: The Blackberry at the End of the Universe 9:40
9:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب9:40
A Blackberry phone as a hacking tool?! For our April Fool's Day episode, we bring you an exclusive interview with hacking genius Dave the Barber, who leveraged a freak accident with a Blackberry into a hack that can compromise any device until the end of time. Send us a text Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

Want to hang out with supermodels on the beach? That's the dream that Billy McFarland sold in 2017 when he advertised Fyre Festival, an outdoor music concert in the Bahamas. Attendees were promised beautiful beaches, live music, comfy villas, gourmet meals, and supermodels around every corner. Instead, they got a gravel parking lot, soggy tents, cheese sandwiches, and no music. And no supermodels, either. What went wrong with Fyre Festival? In this episode, we look at Billy McFarland's delusion through the lens of social media, and how it played a leading role in the misleading people into the fraud that was Fyre Festival. Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 Hacker, Broker, Scam: Following Stolen Data 23:43
23:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب23:43
When a scam caller knows everything about you--your address, social security number, bank account--how do they know? There isn't some super powerful hacker ring with its own call center. Your data is actually stolen at one end of the internet, goes on a trip through hacker forums and dark web stashes, and reappears in a neat spreadsheet for a call center. The more you know about how your data is breached, sold, and aggregated, the better you'll be prepared for your next well-informed call from a scammer. Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
H
How Hacks Happen

1 AI Part 3: Tools, Technology, and Magical Connections 28:33
28:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب28:33
Let's explore the technology behind audio and music AI, and how it makes use of some cool math concepts to bring us convincing and realistic voices and music. Hear some actual AI-generated tunes, and find out how "latent space" changed the way AI generates sounds and music. Resources Ghostwriter, the Mastermind Behind the Viral Drake AI Song, Speaks For the First Time Spotify will not ban AI-made music, says boss Jellybean Benitez Remembers NYC Clubs of Yesteryear Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Join our Patreon to listen ad-free!…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.